Vulnerability Note VU#960468

HP Arcsight Logger and Connector appliances cross-site scripting vulnerability

Original Release date: 06 Aug 2012 | Last revised: 15 Feb 2013

Overview

HP's Arcsight Connector appliance v6.2.0.6244.0 and Arcsight Logger appliance v5.2.0.6288.0 (and possibly other versions) contain a file import facility which is vulnerable to cross-site scripting (XSS).

Description

The supplied facility for importing host data from a file (System Admin Tab | Network | Hosts | Import from Local File) to the HP Arcsight Connector or HP Arcsight Logger appliances fail to sanitize input for cross-site scripting attacks. An attacker with write access to the file that will be imported can add javascript code into the file.  This code will be run in the security context of the appliance administrative web GUI when the file is imported.

Impact

A remote attacker may, by luring a user into importing a malicious host file, be able to disclose sensitive information, steal user cookies, or escalate privileges.

Solution

Update

The vendor's HPSBMU02836 SSRT101056 security advisory states: HP has provided HP ArcSight Connector Appliance v6.4 and HP ArcSight Logger v5.3 to resolve these issues. Please contact HP support to receive updates.

Do not import host file from untrusted sources

Attackers must deliver a malicious host file to, or modify an existing file on, a vulnerable system in order to take advantage of this vulnerability. By only accessing host files, which cannot be modified by unprivileged users, from known and trusted sources the chances of exploitation are reduced.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Hewlett-Packard CompanyAffected02 May 201215 Feb 2013
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 1.7 AV:L/AC:L/Au:S/C:N/I:P/A:N
Temporal 1.3 E:U/RL:U/RC:UC
Environmental 0.5 CDP:L/TD:L/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Michael Rutkowski of Duer Advanced Technology and Aerospace, Inc (DATA) for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

  • CVE IDs: CVE-2012-2960
  • Date Public: 06 Aug 2012
  • Date First Published: 06 Aug 2012
  • Date Last Updated: 15 Feb 2013
  • Document Revision: 13

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.